View
Sorting
Products found: 63
Check Point 1200R…
Features
Wide range of appliances for IT and OT networks The 1200R Rugged Appliance complements our extensive appliance family to support a diverse range of deployment environments and meet specialized requirements in ICS security. The 1200R complies with industrial specifications such as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In addition, the 1200R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV 2.4. The 1200R Appliances can also be used in commercial deployments. Inspect Encrypted Connections There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data. Next-Generation Firewall Check Point Application Control has broad support for specialized Industrial Control System and SCADA protocols with granularity for over 800 SCADA specific commands. This enables protocol-specific visibility and controls with directional awareness. Integrated threat detection and prevention Detect and prevent targeted attacks against ICS/SCADA components in Operational Technology (OT) environments with specific protections for these highly vulnerable, unpatched, legacy embedded systems. Our threat prevention technologies have the best catch rate in the industry and can be deployed in detect-mode to minimize the disruption of operational processes. Best-in-class management Administrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server. With SmartProvisioning™, a profile-based management approach designed for large- scale deployments, administrators can define a single security and device profile and apply it simultaneously to thousands of appliances — dramatically reducing deployment time and administrative overhead.Benefits
- Deploy SCADA networking security in harsh environments and remote locations
- Full visibility and granular control of SCADA traffic
- Comprehensive security with SCADA-aware threat detection and prevention
Check Point 21000 Appliances…
Check Point 600 Appliance…
Check Point Intrusion Prevention System Software Blade…
- Next-generation security prevention, protection and performance
- Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
- Check Point is ranked #1 in Microsoft and Adobe threat coverage
- Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
- Unrivaled, multi-Gigabit performance in an integrated IPS
- Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
- CoreXL technology provides the most efficient and high-performance use of multi-core technologies
- Lowest TCO and fastest ROI of any enterprise-class firewall solution
- One-click activation of IPS and firewall protection on any Check Point gateway
- Delivers unmatched extensibility and flexibility—all without adding CapEx
- Integrated into Check Point Software Blade Architecture for on-demand security
- Malware attacks
- Dos and DDoS attacks
- Application and server vulnerabilities
- Insider threats
- Unwanted application traffic, including IM and P2P
- Geo-protections
- New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
- Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
- Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
- Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
- Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
- Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
- Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
Check Point Next Generation Firewall (NGFW)…
- Identify, allow, block or limit usage of applications, and features within them
- Enable safe Internet use while protecting against threats and malware
- Leverage the world's largest application library with more than 6,600 web 2.0 applications
- Create granular policy definitions per user and group
- Integrate seamlessly with Active Directory
- Protect environments with social media and Internet applications
- Rely on 24/7 advanced protection
- Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities
- Get greater understanding into security events with integrated, easy-to-use centralized management
- Join more than 170,000 customers, including 100 percent of Fortune 100 companies
- Querying the Active Directory
- Through a captive portal
- Installing a one-time, thin client-side agent
Check Point SandBlast…
Check Point SandBlast Agent provides purpose-built advanced Zero-Day Protection capabilities to protect web browsers and endpoints, leveraging Check Point’s industry leading network protections.SandBlast Agent ensures complete real-time coverage across threat vectors, letting your employees work safely no matter where they are without compromising on productivity. Threat Emulation capability emulates unknown files in contained environment to detect malicious behaviors and prevent infections while Threat Extraction provides sanitized risk-free files to the users instantly.
Anti-Ransomware protection stops ransomware in its tracks and reverses the damage automatically, ensures organizations are protected against malicious extortion attacks that encrypt business data and demand ransom payment for its retrieval. Zero Phishing proactively blocks access to new and unknown deceptive websites and safeguards user credentials by preventing the use of corporate passwords on external websites.
SandBlast Agent captures forensics data with continuous collection of all relevant system events, and then provides actionable incident analysis to quickly understand complete attack lifecycle. With visibility into the scope, damage, and attack vectors, incident response teams maximize productivity and minimize organizational exposure.
Features:
- Threat Emulation: Evasion resistant sandbox technology
- Threat Extraction: Delivers sanitized risk-free files to users in real-time
- Anti-ransomware: Prevents and remediates evasive ransomware attacks
- Zero-Phishing: Blocks deceptive phishing sites and alerts on password reuse
- Anti-Bot: Identify and isolate infected hosts
- Anti-Exploit: Protects applications against exploit based attacks
- Behavioral Guard: Detects and blocks malicious behaviors
- Endpoint Antivirus: Protects against known malware
- Forensics: Records and analyzes all endpoint events to provide actionable attack forensics reports
Benefits:
- Advanced threat protection and automated endpoint forensic analysis for all malware types
- Prevents and remediates evasive ransomware attacks
- Proactively blocks known, unknown and zero-day malware
- Provides instant actionable understanding of attacks
- Automatically remediates infections
- Protects users credentials
Check Point vSEC Virtual Edition…
Fast and Scalable Compute Resources…
Virtual machine (VM) instances offer compute resources in many shapes, from a single OCPU to 24 OCPUs, catering to a variety of workloads and software architectures. All Oracle Cloud Infrastructure VM shapes support remote block storage, but the Dense I/O shapes also offer up to 25.6 TB of local NVMe SSD storage for applications requiring low latency, millions of IOPS, and high local storage capacity.
Bare metal instances support applications requiring intensive compute and large memory resources. You can build cloud environments with performance equal or better than other clouds or on-premises infrastructure. Bare metal provides customers with exceptional isolation, visibility, and control.
Accelerated computing requires consistently fast infrastructure across every service. With GPU instances you can process and analyze massive data sets more efficiently, making them ideal for complex machine learning (ML), artificial intelligence (AI) algorithms, and many industrial HPC applications.
Hitachi Content Platform Anywhere…
Hitachi TagmaStore™ Adaptable Modular Storage Model AMS500…
Business Benefits
Gain high-end performance and capacity, priced for the midrange
- Move from server-internal storage to scalable external storage, consolidate multiple storage systems into one, or build a first storage area network (SAN); either iSCSI or Fibre Channel connectivity supported.
- Use NAS connectivity options for collaborative file-sharing applications.
- Deliver application-specific performance, availability, and protection across systems—from a few terabytes to more than 86TB (SATA intermix drives) or 64TB (Fibre Channel drives).
- Use advanced features—Cache Partition Manager and RAID-6—to help improve performance, reliability, and usability.
- Partition and dedicate cache to maximize performance of high-I/O applications.
- Support outstanding performance for virtually any workload, with 2,048 logical units (LUNs).
- Choose between SATA intermix and Fibre Channel to host any workload on the most economical storage system.
- Consolidate and centralize management to reduce costs.
- Scale to 86.9TB of SATA and Fibre Channel intermix or to 64.7TB of Fibre Channel storage capacity.
- Enhanced SATA data protection provides unmatched data availability and resiliency.
- RAID-6 ensures high availability and flexibility in RAID group rebuild.
- Hi-Track® “call-home” service/remote maintenance tool for 24/7 diagnostics keeps potential issues from becoming problems.
- Fully redundant and hot-swappable components keep your applications online.
- Within-system volume replication or incremental copies provide frequent and nondisruptive backups.
- Remote replication is enabled by Hitachi TrueCopy™ Remote Replication software.
- Plug-and-play SAN Kits for Microsoft Simple SAN and SAN Starter solutions for easy deployment
- Diskless boot for SAN-attached servers
- High-capacity storage for network attached storage (NAS) applications
- Systems management and configuration using Storage Management and Hitachi HiCommand® Suite software
- Microsoft Exchange Server, ERP, CRM, database, NAS filer, backup applications, or tape replacement
- Archival and long-term tamperproof data retention to meet regulatory requirements
- Complete data lifecycle management solutions within a tiered storage environment when combined with Hitachi enterprise-class storage
HITACHI UNIFIED STORAGE VM…
Hitachi Universal Storage Platform V…
Hitachi Virtual Storage Platform G1000…
NetSuite…
NSX SD-WAN by VeloCloud…
Oracle Adaptive Intelligent Apps…
Oracle Beehive…
Oracle BeehiveOnline helps groups within Oracle share information and better collaborate with partners and customers.
In a scalable and secure environment, Oracle BeehiveOnline offers a range of integrated collaboration services including team workspaces, shared document repositories, scheduling, web conferencing and more. It improves team productivity, boosts the speed and quality of decision making, and improves the reuse of information.
Oracle Business Intelligence…
Oracle CASB Cloud Service…
Oracle Cloud Applications…
- Applications (SaaS): Oracle offers the most complete, innovative, and proven cloud suite of SaaS applications that enable customers to transform their business with the latest intelligent technologies such as AI and machine learning.
- Data (DaaS): Oracle Data Cloud provides data from a wide variety of Oracle and third-party sources, which can be used by sales and marketing to produce better business outcomes.
- Platform (PaaS): Oracle offers the broadest range of PaaS services in the industry, which enable developers, IT professionals, and business leaders to develop, extend, and secure applications that leverage advanced analytics.
- Infrastructure (IaaS): Oracle offers the highest performance, lowest cost IaaS in the industry, enabling customers to run their application workloads in the Oracle Cloud.
- Oracle empowers all sizes of companies, from startups to global enterprises.
- Choose from more than 1,000 cloud applications, translated to 35 languages and used in 175 countries.
- Enhance your business IQ with adaptive intelligence. With decision science and machine learning embedded directly into business processes, business leaders can focus on managing their business outcomes rather than managing new technology. Examples include dynamic demand forecasts (SCM), personalized offers (CX), adaptive buy signals (ERP), and optimal candidates (HCM).
- Utilize Internet of Things (IoT) cloud offerings to increase existing business application value with intelligent data and predictive analytics.
- Leverage Oracle's mobile apps to manage the business and increase productivity while improving employee work-life balance through location flexibility.
- In addition, use Oracle's integrated cloud tools to extend or build new business processes.
- UBS securely delivers HR services to its 60,000 employees worldwide
- HSBC streamlined and secured global business processes across in 72 countries.
- Esterline consolidated 120+ ledgers, 12 currencies, and 30 chart of accounts.
- GE Digital went live on Enterprise Resource Planning Cloud in 5 months
- FEMSA Logistica went live on Supply Chain Management Cloud in 12 weeks
- Blackboard went live on Human Capital Management Cloud in 6 months
- ClubMed went live on Service Cloud in 12 weeks
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.